CN112148597B - Method for eliminating iOS device authorization dialog box, test method and storage medium - Google Patents

Method for eliminating iOS device authorization dialog box, test method and storage medium Download PDF

Info

Publication number
CN112148597B
CN112148597B CN202010972373.0A CN202010972373A CN112148597B CN 112148597 B CN112148597 B CN 112148597B CN 202010972373 A CN202010972373 A CN 202010972373A CN 112148597 B CN112148597 B CN 112148597B
Authority
CN
China
Prior art keywords
application program
application
ios device
eliminating
hook code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010972373.0A
Other languages
Chinese (zh)
Other versions
CN112148597A (en
Inventor
杨凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Keynote Network Inc
Original Assignee
Beijing Keynote Network Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Keynote Network Inc filed Critical Beijing Keynote Network Inc
Priority to CN202010972373.0A priority Critical patent/CN112148597B/en
Publication of CN112148597A publication Critical patent/CN112148597A/en
Application granted granted Critical
Publication of CN112148597B publication Critical patent/CN112148597B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The application relates to a method for eliminating an iOS device authorization dialog box, a test method and a storage medium, wherein the method for eliminating the iOS device authorization dialog box comprises the following steps: acquiring an ID of a first application program; and replacing the ID of the second application program with the ID of the first application program so that the second application program uses the authorization information of the first application program. The test method comprises the following steps: installing a first application program in the iOS device; setting the authority of the first application program to generate authorization information of the first application program in the iOS device; replacing the ID of the second application program with the ID of the first application program so that the second application program uses the authorization information of the first application program; installing the second application program in the iOS device; the second application is tested using the test script. By the method and the device, the authorization dialog box during the operation of the application program is avoided, and the automatic test is realized.

Description

Method for eliminating iOS device authorization dialog box, test method and storage medium
Technical Field
The present application relates to the field of software testing technologies, and in particular, to a method for eliminating an iOS device authorization dialog box, a testing method, and a storage medium.
Background
On the iOS device, after an application program (APP) is installed, when the APP runs for the first time (but not limited to this), the system pops up various authorization dialog boxes according to resources used by the APP, for example: whether an open location service is running, whether an album can be accessed, whether a cellular network can be used, etc. These dialog boxes are all system-level dialog boxes, and the APP cannot be eliminated by simulating clicks.
In an automated test, if these dialogs are not eliminated, the APP test will be abnormal, thereby terminating the automated test flow.
Disclosure of Invention
To solve the above technical problem or at least partially solve the above technical problem, the present application provides a method, a test method, and a storage medium for eliminating an iOS device authorization dialog.
In a first aspect, the present application provides a method for eliminating an iOS device authorization dialog, comprising: acquiring an ID of a first application program; and replacing the ID of the second application program with the ID of the first application program so that the second application program uses the authorization information of the first application program.
In some embodiments, the method for eliminating an iOS device authorization dialog described above further includes: storing the ID of the second application in a static resource of the second application; injecting a Hook code in the second application, wherein the Hook code is configured to obtain the ID of the second application from the static resource and provide the ID of the second application to the second application.
In some embodiments, the method for eliminating an iOS device authorization dialog described above further includes: installing a first application program in the iOS device; setting the authority of the first application program to generate the authorization information of the first application program in the iOS device.
In some embodiments, the method for eliminating an iOS device authorization dialog described above further includes: modify a load command (loadcommand) list of a map-o (Mach object) file to cause the Hook code to be loaded preferentially.
In some embodiments, injecting Hook code in the second application includes: the Hook code is put into the arbitrary class + load method of the second application.
In a second aspect, the present application provides a testing method, comprising: installing a first application program in the iOS device; setting the authority of the first application program to generate authorization information of the first application program in the iOS device; replacing the ID of the second application program with the ID of the first application program so that the second application program uses the authorization information of the first application program; installing the second application program in the iOS device; the second application is tested using the test script.
In some embodiments, before installing the second application in the iOS device, further comprising: storing the ID of the second application in a static resource of the second application; injecting a Hook code in the second application, wherein the Hook code is configured to obtain the ID of the second application from the static resource of the second application and provide the ID of the second application to the second application.
In some embodiments, the testing method further comprises: the loadcommand list of the map-o file is modified so that the Hook code is loaded preferentially.
In some embodiments, injecting Hook code in the second application includes: the Hook code is put into the arbitrary class + load method of the second application.
In a third aspect, the present application provides a computer readable storage medium having stored thereon a program for eliminating an iOS device authorization dialog, which when executed by a processor implements the steps of a method of eliminating an iOS device authorization dialog.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages: according to the method provided by the embodiment of the application, the ID of the second application program is replaced by the ID of the first application program, so that the iOS device can use the authorization information of the first application program when the second application program is tested, the permission of the second application program does not need to be set, an authorization dialog box does not exist during running, and the automatic test is facilitated.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a flowchart of one embodiment of a method for eliminating an iOS device authorization dialog box according to an embodiment of the present invention;
FIG. 2 is a flow chart of one embodiment of a testing method provided in an embodiment of the present application; and
fig. 3 is a hardware schematic diagram of an implementation manner of a computer device according to an embodiment of the present application.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
On iOS devices (e.g., apple smart devices such as iPhone, iPad, etc.), when APP uses restricted resources (e.g., private data and tariff related resources), a dialog box pops up for the user to confirm. After the user sets the authority, the iOS system records the authorization information of each APP, and stores the authorization information of the APP and the unique identifier (also called bundleID, application ID, etc.) of the APP into a local database of the iOS device. Due to sandbox limitations, the APP cannot access the database.
When the APP runs, if a certain limited resource is used, the iOS system firstly queries a database, if authorization information corresponding to the ID of the APP exists, execution is carried out according to authorization, and if the authorization information does not exist, a dialog box is popped up. When the APP is unloaded, all the authorization information related to the APP is deleted.
The embodiment of the present application provides a method for eliminating an iOS device authorization dialog, as shown in fig. 1, the method includes steps S102 to S104.
Step S102, obtaining the ID of the first application program.
Step S104, replacing the ID of the second application program with the ID of the first application program so that the second application program can use the authorization information of the first application program.
By the method provided by the embodiment of the application, the ID of the second application program is replaced by the ID of the first application program, so that the iOS device can use the authorization information of the first application program when the second application program is tested, the permission of the second application program does not need to be set, an authorization dialog box is not required during running, and the automatic test is facilitated.
In the embodiment of the application, the second application program with the replaced ID is obtained by unpacking, packing and re-signing the second application program.
In some cases, the application itself needs to use the ID (e.g., the service side of the application may verify the ID of the application), and some functions of the application may be affected after replacing the ID, so that, in some embodiments, the method for eliminating the iOS device authorization dialog described above further includes: storing the ID of the second application in a static resource of the second application; injecting a Hook code in the second application, wherein the Hook code is configured to obtain the ID of the second application from the static resource and provide the ID of the second application to the second application. Thus, when the internal code of the second application gets the application ID (e.g., but not limited to, the application checks its own ID or sends the ID to the server), the Hook code returns the original ID instead of the ID of the first application.
In some embodiments, the first application is installed in the iOS device prior to installing or testing the second application; the authority of the first application is set to generate authorization information of the first application in the iOS device. Typically, the permissions of the second application are a subset of the permissions of the first application, but are not so limited.
In order for the second application to obtain its original ID, in some embodiments, the loadcommand list of the map-o file is modified so that the Hook code is loaded preferentially. In some embodiments, the loadcommand list of the map-o file is modified so that the Hook code is loaded first, but embodiments of the present application are not so limited.
Since + load is the automatic, earliest execution once a library is loaded, in some embodiments Hook code is injected in the second application, including: the Hook code is put into the arbitrary class + load method of the second application.
The embodiment of the present application further provides a testing method, as shown in fig. 2, the testing method includes steps S202 to S210.
In step S202, a first application is installed in the iOS device.
Step S204, the authority of the first application program is set so as to generate the authorization information of the first application program in the iOS device.
In step S206, the ID of the second application is replaced with the ID of the first application, so that the second application uses the authorization information of the first application.
In step S208, the second application is installed in the iOS device.
Step S210, the second application is tested using the test script.
By the method provided by the embodiment of the application, the ID of the second application program is replaced by the ID of the first application program, so that the iOS device can use the authorization information of the first application program when the second application program is tested, the permission of the second application program does not need to be set, an authorization dialog box is not required during running, and the automatic test is facilitated.
In some embodiments, before installing the second application in the iOS device, further comprising: storing the ID of the second application in a static resource of the second application; injecting a Hook code in the second application, wherein the Hook code is configured to obtain the ID of the second application from the static resource of the second application and provide the ID of the second application to the second application. Thus, when the internal code of the second application gets the application ID (e.g., but not limited to, the application checks its own ID or sends the ID to the server), the Hook code ensures that the original ID is returned instead of the ID of the first application.
In order for the second application to obtain its original ID, in some embodiments, the loadcommand list of the map-o file is modified so that the Hook code is loaded preferentially. In some embodiments, the loadcommand list of the map-o file is modified so that the Hook code is loaded first, but embodiments of the present application are not so limited.
In some embodiments, injecting Hook code in the second application includes: the Hook code is put into the arbitrary class + load method of the second application, but is not limited thereto.
The embodiment also provides a computer device, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a rack server, a blade server, a tower server or a rack server (including an independent server or a server cluster composed of a plurality of servers) capable of executing programs, and the like. The computer device 20 of the present embodiment includes at least, but is not limited to: a memory 21, a processor 22, which may be communicatively coupled to each other via a system bus, as shown in FIG. 3. It is noted that fig. 3 only shows the computer device 20 with components 21-22, but it is to be understood that not all shown components are required to be implemented, and that more or fewer components may be implemented instead.
In the present embodiment, the memory 21 (i.e., a readable storage medium) includes a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the storage 21 may be an internal storage unit of the computer device 20, such as a hard disk or a memory of the computer device 20. In other embodiments, the memory 21 may also be an external storage device of the computer device 20, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like, provided on the computer device 20. Of course, the memory 21 may also include both internal and external storage devices of the computer device 20. In this embodiment, the memory 21 is generally used for storing an operating system and various types of application software installed in the computer device 20, such as program codes of a method for eliminating an iOS device authorization dialog box, a test method, and the like. Further, the memory 21 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 22 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 22 is typically used to control the overall operation of the computer device 20. In this embodiment, the processor 22 is configured to execute the program code stored in the memory 21 or process data, for example, the program code of the method for eliminating the iOS device authorization dialog box and the test method, so as to implement the method for eliminating the iOS device authorization dialog box and the test method.
The present embodiment also provides a computer-readable storage medium, such as a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application mall, etc., on which a computer program is stored, which when executed by a processor implements corresponding functions. The computer-readable storage medium of the present embodiment is used for storing an index time-series abnormality detection program, and when executed by a processor, implements the method of eliminating the iOS device authorization dialog box, and the steps of the test method.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (8)

1. A method of eliminating an iOS device authorization dialog for testing of a second application, comprising:
acquiring an ID of a first application program;
replacing the ID of the second application program with the ID of the first application program, so that the iOS device uses the authorization information of the first application program to authorize the second application program when running the second application program; and
storing the ID of the second application in a static resource of the second application;
and injecting a Hook code into the second application program, wherein the Hook code is configured to acquire the ID of the second application program from the static resource and provide the ID of the second application program to the second application program when the internal code of the second application program acquires the ID of the second application program.
2. The method of claim 1, further comprising:
installing a first application program in the iOS device;
setting the authority of the first application program to generate the authorization information of the first application program in the iOS device.
3. The method of claim 1, further comprising:
and modifying the loadcommand list of the map-o file so that the Hook code is loaded preferentially.
4. The method of claim 1 or 3, wherein injecting Hook code in the second application comprises:
the Hook code is put into the arbitrary class + load method of the second application.
5. A method of testing, comprising:
installing a first application program in the iOS device;
setting the authority of the first application program to generate authorization information of the first application program in the iOS device;
replacing the ID of the second application program with the ID of the first application program, so that the iOS device uses the authorization information of the first application program to authorize the second application program when running the second application program;
installing the second application in the iOS device;
testing the second application using a test script;
wherein the content of the first and second substances,
before installing the second application in the iOS device, further comprising:
storing the ID of the second application in a static resource of the second application;
and injecting a Hook code into the second application program, wherein the Hook code is configured to acquire the ID of the second application program from the static resource and provide the ID of the second application program to the second application program when the internal code of the second application program acquires the ID of the second application program.
6. The test method of claim 5, further comprising:
and modifying the loadcommand list of the map-o file so that the Hook code is loaded preferentially.
7. The test method according to claim 5 or 6, characterized in that injecting Hook code in the second application program comprises:
the Hook code is put into the arbitrary class + load method of the second application.
8. A computer-readable storage medium, having stored thereon a program for eliminating an iOS device authorization dialog, the program for eliminating an iOS device authorization dialog, when executed by a processor, implementing the steps of the method for eliminating an iOS device authorization dialog as claimed in any of claims 1 to 4.
CN202010972373.0A 2020-09-16 2020-09-16 Method for eliminating iOS device authorization dialog box, test method and storage medium Active CN112148597B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010972373.0A CN112148597B (en) 2020-09-16 2020-09-16 Method for eliminating iOS device authorization dialog box, test method and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010972373.0A CN112148597B (en) 2020-09-16 2020-09-16 Method for eliminating iOS device authorization dialog box, test method and storage medium

Publications (2)

Publication Number Publication Date
CN112148597A CN112148597A (en) 2020-12-29
CN112148597B true CN112148597B (en) 2021-12-10

Family

ID=73892961

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010972373.0A Active CN112148597B (en) 2020-09-16 2020-09-16 Method for eliminating iOS device authorization dialog box, test method and storage medium

Country Status (1)

Country Link
CN (1) CN112148597B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113076258B (en) * 2021-04-21 2023-09-19 ***通信集团陕西有限公司 Method, device and equipment for applying permission and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105468405A (en) * 2015-11-18 2016-04-06 深圳市创想天空科技股份有限公司 Installation processing method and device of application program
CN105786551A (en) * 2014-12-26 2016-07-20 北京元心科技有限公司 Application program operation access control method and system
CN110321669A (en) * 2019-06-04 2019-10-11 平安科技(深圳)有限公司 Method, apparatus, equipment and the storage medium that application program is signed again
CN111177710A (en) * 2019-12-31 2020-05-19 维沃移动通信有限公司 Application authorization method, electronic device and storage medium

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050262487A1 (en) * 2004-05-11 2005-11-24 International Business Machines Corporation System, apparatus, and method for identifying authorization requirements in component-based systems
CN102467642B (en) * 2010-11-17 2015-02-25 北大方正集团有限公司 Permission control method and device for application software
CN103123605B (en) * 2013-02-07 2018-12-14 百度在线网络技术(北京)有限公司 A kind of Android platform automatic integration test method and device
US9378119B2 (en) * 2014-09-17 2016-06-28 Verizon Patent And Licensing Inc. Release template
CN104283953B (en) * 2014-09-30 2017-08-11 清华大学 A kind of position information share system and sharing method
CN105303071B (en) * 2015-09-18 2018-06-12 许继集团有限公司 A kind of embedded device program authorization guard method
CN105574369A (en) * 2015-12-14 2016-05-11 网易(杭州)网络有限公司 Method, device and system for re-signing application program
CN106126290B (en) * 2016-06-27 2019-08-13 微梦创科网络科技(中国)有限公司 Application program optimization method, apparatus and system
US10346290B2 (en) * 2016-10-31 2019-07-09 International Business Machines Corporation Automatic creation of touring tests
CN106845162B (en) * 2016-12-20 2020-05-26 北京五八信息技术有限公司 Re-signing method and device
CN108337540B (en) * 2017-01-20 2021-11-23 中兴通讯股份有限公司 Authorization management method, device and system
CN107544811B (en) * 2017-09-08 2020-07-31 武汉斗鱼网络科技有限公司 Method, storage medium, electronic device and system for hiding dylib file in IOS platform
CN108089880A (en) * 2017-12-28 2018-05-29 北京奇虎科技有限公司 The method, apparatus and server pre-processed to application program installation file
CN109995534B (en) * 2017-12-29 2022-04-26 北京京东尚科信息技术有限公司 Method and device for carrying out security authentication on application program
CN110209578B (en) * 2019-05-21 2022-07-08 苏州浪潮智能科技有限公司 Information online test platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105786551A (en) * 2014-12-26 2016-07-20 北京元心科技有限公司 Application program operation access control method and system
CN105468405A (en) * 2015-11-18 2016-04-06 深圳市创想天空科技股份有限公司 Installation processing method and device of application program
CN110321669A (en) * 2019-06-04 2019-10-11 平安科技(深圳)有限公司 Method, apparatus, equipment and the storage medium that application program is signed again
CN111177710A (en) * 2019-12-31 2020-05-19 维沃移动通信有限公司 Application authorization method, electronic device and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Android (Nougats) security issues and solutions;Shahid Iqbal;《2018 IEEE International Conference on Applied System Invention (ICASI)》;20180625;1-2 *
Masque Attack Spoofs Apps, Bypasses Privacy Protection;Trend Micro;《https://www.trendmicro.com/en_us/research/16/j/ios-masque-attack-spoof-apps-bypass-privacy-protection.html》;20161031;1-6 *
基于JSON Web签名的Web安全研究;GOGOE VIDJINNAGNI PAUL;《中国优秀硕士学位论文全文数据库 信息科技辑》;20171215;I139-90 *

Also Published As

Publication number Publication date
CN112148597A (en) 2020-12-29

Similar Documents

Publication Publication Date Title
CN110597531B (en) Distributed module upgrading method and device and storage medium
CN105867947A (en) Data processing method and device after upgrades of preset applications
CN103826215A (en) Method and apparatus for carrying out root authority management at terminal equipment
CN109815680B (en) Application authority management method and device, terminal equipment and storage medium
CN110515795B (en) Big data component monitoring method and device and electronic equipment
CN111263354B (en) OTA differential upgrading method and device
CN107908553B (en) Association testing method, application server and computer readable storage medium
CN111181975A (en) Account management method, device, equipment and storage medium
CN111159595A (en) Page loading method, system, computer equipment and computer readable storage medium
CN109710286B (en) System upgrading method, device, equipment and storage medium
CN111460496A (en) Permission configuration method based on user role, electronic device and storage medium
CN112148597B (en) Method for eliminating iOS device authorization dialog box, test method and storage medium
CN111026080A (en) Hardware-in-loop test method and device for controller
CN110597662B (en) Backup data automatic verification method and device, user equipment and storage medium
CN110750434A (en) Interface testing method and device, electronic equipment and computer readable storage medium
CN113259397B (en) Method, device and equipment for executing plan and readable storage medium
US20160004850A1 (en) Secure download from internet marketplace
CN112559352A (en) Interface test method, device, equipment and storage medium
CN111046377B (en) Method and device for loading dynamic link library, electronic equipment and storage medium
CN111159985B (en) Data deriving method, apparatus, computer device and computer readable storage medium
CN112685077A (en) Data modification method, system, computer device and computer readable storage medium
CN109429260A (en) A kind of method of calibration and device of northbound data
CN109492144B (en) Association relation analysis method, device and storage medium for software system
CN110837500A (en) Data screening method and device based on local embedded window and computer equipment
CN112698842A (en) Method and device for acquiring additional information of application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant